From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754635Ab1G0NBz (ORCPT ); Wed, 27 Jul 2011 09:01:55 -0400 Received: from acsinet15.oracle.com ([141.146.126.227]:25601 "EHLO acsinet15.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753148Ab1G0NBw (ORCPT ); Wed, 27 Jul 2011 09:01:52 -0400 Date: Wed, 27 Jul 2011 08:59:47 -0400 From: Konrad Rzeszutek Wilk To: Andy Lutomirski Cc: x86@kernel.org, Linux Kernel Mailing List , jeremy@goop.org, keir.xen@gmail.com, xen-devel@lists.xensource.com, virtualization@lists.linux-foundation.org Subject: Re: [PATCH 0/5] Collected vdso/vsyscall fixes for 3.1 Message-ID: <20110727125947.GC6713@dumpdata.com> References: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.21 (2010-09-15) X-Source-IP: rtcsinet21.oracle.com [66.248.204.29] X-CT-RefId: str=0001.0A090208.4E300BD0.003C,ss=1,re=0.000,fgs=0 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Jul 26, 2011 at 11:20:34PM -0400, Andy Lutomirski wrote: > This fixes various problems that cropped up with the vdso patches. > > - Patch 1 fixes an information leak to userspace. > - Patches 2 and 3 fix the kernel build on gold. > - Patches 4 and 5 fix Xen (I hope). > > Konrad, could you could test these on Xen and run 'test_vsyscall test' [1]? > I don't have a usable Xen setup. Sure.